Abstract—One of the most high profie threats to information integrity is the computer virus. In this paper, I am presenting what are viruses, worms, and Trojan horses and their differences, different strategies of virus spreading and case studies of
Slammer and Blaster worms.
I. INTRODUCTION
The internet consists of hundreds of millions of computers distributed around the world. Millions of people use the internet daily, taking full advantage of the available services at both personal and professional levels. The internet connectivity among computers on which the World Wide Web relies, however renders its nodes on easy target for malicious users who attempt to exhaust their resources or damage the data or create a havoc in the network.
Computer Viruses, especially in recent years, have increased dramatically in number. One of the most highprofile threats to information integrity is the Computer Virus.
Surprisingly, PC viruses have been around for two-thirds of the
IBM PC’s lifetime, appearing in 1986. With global computing on the rise, computer viruses have had more visibility in the past few years. In fact, the entertainment industry has helped by illustrating the effects of viruses in movies such as
”Independence Day”, ”The Net”, and ”Sneakers”. Along with computer viruses, computer worms are also increasing day by day. So, there is a need to immunise the internet by creating awareness in the people about these in detail. In this paper I have explained the basic concepts of viruses and worms and how they spread.
The basic organisation of the paper is as follows.
In section 2, give some preliminaries: the definitions of computer virus, worms, trojan horses, as well as some other malicious programs and also basic characteristics of a virus.
In section 3, detailed description: describe Malicious Code
Environments where virus can propagate, Virus/Worm types overview where different types
References: [1] Peter Szor, The Art of Computer Virus and Defence, Harlow, England: Addison Wesely Professional, 2005. [2] Norman, Norman book on Computer Virus, Norman ASA, 2003. [8] H. Kopka and P. W. Daly, A Guide to LATEX, 3rd ed. Harlow, England: Addison-Wesley, 1999.